0% found this document useful (0 votes)
23 views5 pages

Final exams_CN_S1_2021-22_ODD_signed_ans_revised

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views5 pages

Final exams_CN_S1_2021-22_ODD_signed_ans_revised

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International University - VNUHCM

School/Department Name
-----------------

Final Examination (ODD)


Date: Jan. 11st, 2022; Duration: 90 minutes
Open book; Online

SUBJECT: Computer Networks (ID: IT091IU)


Approval by the School of Computer Science and Lecturer:
Engineering Signature
Signature

Full name: Nguyễn Văn Sinh Full name: Võ Thị Lưu Phương
Proctor 1 Proctor 2
Signature Signature

Full name: Full name:

STUDENT INFO
Student name:

Student ID:

INSTRUCTIONS: the total of points is 100 (equivalent to 30% of the course)


1. Purpose:
• Analyze the components, architecture, and protocols in computer networks (CLO1)
• Apply the theory in designing a small/medium computer network (CLO2)
2. Requirements:
• Read carefully each question and answer it following the requirements.
• Write the answers CLEAN and TIDY in the exam paper
• Submit your exam to Blackboard

[The questions from here…]


International University – VNUHCM Student Name:………...………….
School/Department Name Student ID:……………………….
-----------------

QUESTIONS
Q1. (10 marks) What is the key equation used in link-state routing protocol? Explain the equation via
an example?

Q2. (10 marks) Consider the following topology.


a. Suppose A would like to send an IP datagram to D and assume that A’s ARP cache does not
contain D’s MAC address. Will A perform an ARP query to find D’s MAC address? Why?
b. In the Ethernet frame containing the IP datagram destined to D sent from A, what are the source
and destination IP and MAC addresses?

Q3. (10 marks) If a host has IP address 10.8.242.10/23.


a. (5 points) What are the subnetwork address and broadcast address of the subnet of this host?
b. (5 points) What is the valid IP range of this subnetwork?

Q4. (10 marks) Using the IP range 10.8.0.0/16, please assign the IP addresses for two subnets with
the subnetwork addresses, subnet mask, and valid IP ranges of each subnet. Each subnet can support
4000 IP addresses.

Q5. (10 marks) that network layer functionality can be divided into data plane functionality and control
plane functionality. What are the main functions of the data plane and the control plane?

Q6. (10 marks) Consider a datagram network using 8-bit host addresses. Suppose a router uses
longest prefix matching and has the following forwarding table:

2 /5
International University – VNUHCM Student Name:………...………….
School/Department Name Student ID:……………………….
-----------------

For each of the four interfaces, give the associated range of destination host addresses and the number
of addresses in the range

Q7. (10 marks) Recall that with the CSMA/CD protocol, the adapter waits K*512 bit times after a
collision, where K is drawn randomly. For K = 100, how long does the adapter wait until returning to
Step 2 for a 100 Mbps broadcast channel?

Q8. (10 marks) Describe a situation in which the hidden terminal problem occurs? How can RTS/CTS
messages solve the hidden terminal problem?

Q9. (10 marks) Why do we need VLAN trunking? Give an example of usages of VLAN trunking in a
network?

Q10. (10 marks) Consider the pattern of red and black packet arrivals to a router’s output port queue,
shown below. Suppose each packet takes one time slot to be transmitted and can only begin
transmission at the beginning of a time slot after its arrival. Indicate the sequence of departing packet
numbers (at t = 1, 2, 3, 4, 5, 7, 8) under priority scheduling, where red packets have higher priority.

What are the packet numbers departed in time slots 1, 2, 3, 4, 5, 6, 7, 8?


For example, the answer could be 1, 2, none, 3, 4, 5, 6, 7.

– END –

3 /5
International University – VNUHCM Student Name:………...………….
School/Department Name Student ID:……………………….
-----------------

ANSWERS
Questions Lessons and CLOs
Q1. (10 marks) Chapter 5: Network layer-
Dijkstra's shortest path equation: 5 points control plane
Show a step applying Dijkstra update for routing update: 5 points CLO1: Analyze the
components, architecture, and
protocols in computer networks
Q2. (10 marks) Chapter 6: The Link Layer
a) No. Since D is in different subnet. and LANs
b) Source IP: 10.8.0.2; Destination IP: 10.8.10.7 CLO1: Analyze the
Source MAC add.: …-FF-55; Destination MAC add.: …-56-2A. components, architecture, and
protocols in computer networks
Q3. (10 marks) 10.8.242.10/23 Topic: IP addressing
a. subnetmask: /23 => 11111111.11111111.11111110.00000000 CLO1: Analyze the
IP 10.8.142.10 => 10 . 8 .11110010. 10 (242 components, architecture, and
= 128+64+32 +16+2) protocols in computer networks
Range: 10.8. 1111001|x.xxxxxxxx
Subnetwork address: 10.8. 1111001|0.00000000 = 10.8.242.0
Broadcast address: 10.8.1111001|1.11111111= 10.8.243.255

b. Valid range: 10.8. 242.1 - 10.8.243.254 /23


Q4. (10 marks) 4000 IPs, 2^12 = 4096, 2^11 = 2048, hence, Topic: IP addressing
subnetmask should be /20 CLO2: Apply the theory in
Mask /20: 11111111.1111111.1111|0000.00000000 designing a small/medium
- 1st subnet: 10 . 8 .0000|0000.00000000 computer network
subnetwork address: 10.8.0000|0000.00000000 = 10.8.0.0/20
Broadcast address: 10.8.0000|1111.11111111 = 10.8.15.255/20
Valid range: 10.8.0.1/20 - 10.8.15.254/20
- 2nd subnet: 10 .8.0001|0000.00000000
subnetwork address: 10.8.0001|0000.00000000 = 10.8.16.0/20
Broadcast address: 10.8.0000|1111.11111111 = 10.8.31.255/20
Valid range: 10.8.8.1/20 - 10.8.15.254/20

Note: The students who chose less than 04 subnet bits (subnet
size > 4096) are still correct.
Q5. (10 marks) CLO1: Analyze the
data plane: data forwarding components, architecture, and
control plane: routing protocols in computer networks

4 /5
International University – VNUHCM Student Name:………...………….
School/Department Name Student ID:……………………….
-----------------

Q6. (10 marks) Chapter 4: The Network


Interface 0: 1xxxxxxx: 10000000 – 11111111 = 128 – 255 Layer: Data Plane
Interface 1: 10xxxxxx: 10000000 – 10111111 = 128 – 192 CLO1: Analyze the
Interface 2: 111xxxxx: 11100000 – 11111111 = 224 = 255 components, architecture, and
Interface 3: not belong to above ranges protocols in computer networks
Q7. (10 marks) Chapter 6: The Link Layer and
100 Mbps, hence 1 bit time = 100/10^6 = 10^(-8) LANs
Adapter wait: 100*512*10^(-8) = 512 micro seconds. CLO1: Analyze the
components, architecture, and
protocols in computer networks
Q8. (10 marks) Chapter 7: Wireless and Mobile
A – B can communicate, B-C can communicate, but A-C cannot. Networks
Hence, C is not aware of A is sending to B, C send data to B cause CLO1: Analyze the
collision at B. components, architecture, and
Before sending data, A den RTS, B receive RTS and broadcast protocols in computer networks
CTS to reserve the channel for a period recorded in RTS and CTS
field. C receives CTS and doesn’t send data in that period.
Q9. (10 marks) Chapter 6: The Link Layer and
Using VLAN trunk for network scalable. LANs
Example trunking between 2 switches, between switch and router CLO1: Analyze the
(student should use figure and describe on the figure) components, architecture, and
protocols in computer networks
Q10. (10 marks) Chapter 4: The Network
1, 3, 5, 2, 4, 6, 7, none Layer: Data Plane
CLO1: Analyze the
components, architecture, and
protocols in computer networks

5 /5

You might also like